Detailed Description
The application aims to provide a technical scheme that when a user wearing a VR terminal executes a target task needing identity verification, the legality of the identity of the user can be actively verified by executing a preset interaction behavior, and then privacy and safety of the user when the user uses a virtual reality terminal can be guaranteed.
When a user executes a target task needing identity verification, a VR terminal can acquire interactive behavior characteristics of the user through preset sensing hardware, and the acquired interactive behavior characteristics are matched with interactive behavior characteristics preset by a legal user of the VR terminal; if the collected interactive behavior characteristics are matched with the preset interactive behavior characteristics, the identity of the user wearing the VR terminal is determined to be legal, and the target task is executed, so that the purpose that the user can actively verify the identity validity of the user by executing the preset interactive behavior if the target task needing identity verification is required to be executed in the process of wearing the VR terminal to perform immersion experience is achieved, and the privacy and the safety of the user when the user uses the VR terminal can be further guaranteed.
The present application is described below with reference to specific embodiments and specific application scenarios.
Referring to fig. 1, fig. 1 is a flowchart illustrating a service implementation method based on a virtual reality scene according to an embodiment of the present application, applied to a VR terminal, that performs the following steps:
step 101, in response to an execution instruction for a target task needing to be subjected to identity verification, acquiring interactive behavior characteristics of a user wearing the virtual reality terminal through preset sensing hardware;
102, matching the collected interactive behavior characteristics with interactive behavior characteristics preset by a legal user of the virtual reality terminal;
and 103, if the acquired interactive behavior characteristics are matched with the preset interactive behavior characteristics, determining that the identity of the user wearing the virtual reality terminal is legal, and executing the target task.
The VR terminal is terminal equipment which is developed based on VR technology and can provide three-dimensional immersion experience for users; for example, the VR may be a head-mounted helmet, glasses, or other form of VR terminal device.
In practical applications, the VR terminal may output a VR scene model developed by a developer to a wearer based on a Virtual Reality Operation System (VROS), so that the wearer can obtain a three-dimensional immersion experience in the output VR scene.
The target task generally refers to a task which can be completed in a VR scene presented by a VR terminal facing a user and needs to verify the identity of the user when the user wears the VR terminal to perform immersion experience;
for example, in practical applications, the target task may include an unlocking task for the VR terminal; the verification task for the quick payment is completed by the user in the VR scene; the authentication task for account login is completed by a user in a VR scene; or other target tasks that can be completed in a VR scenario and require authentication of the user's identity.
The sensing hardware may specifically include an infrared sensor, an image sensor, a laser sensor, a radar sensor, and the like, and is not particularly limited in this example;
the interactive behavior features generally refer to behavior features corresponding to all interactive behaviors executed in a VR scene when a user wears the VR terminal for immersion experience;
for example, in practical applications, the interactive behavior feature may include a head gesture of the user, a three-dimensional gesture, or a displacement trajectory generated by the user controlling the movement of the visual focus in the VR scene through the head gesture, the three-dimensional gesture, or an external device (such as an external joystick, a joystick, or the like).
In this example, in order to ensure privacy and security of a user when using the VR terminal, a legitimate user of the VR terminal may interact with an operating system of the VR terminal, and an interaction behavior feature for performing identity authentication on the identity of the legitimate user is preset in the operating system of the VR terminal. When the user uses the VR terminal, the validity of the identity of the user can be actively verified by executing the preset interactive behavior characteristics in the VR scene.
In this case, the technical solutions shown in the above steps 101 to 103 may be an authentication logic in an operating system of the VR terminal, and after the user wears the VR terminal to trigger execution of the target task, the operating system of the VR terminal may respond to an execution instruction sent by the user after triggering the target task, and by executing the authentication logic, the interactive behavior feature of the user wearing the VR terminal is collected based on preset sensing hardware, and then the collected interactive behavior feature is matched with a preset interactive behavior feature of a legal user of the VR terminal, so as to perform legal verification on the identity of the wearer, and further, based on an authentication result, it may be determined whether the target task can be normally executed.
In an embodiment shown, if the collected interactive behavior feature matches the preset interactive behavior feature, at this time, an operating system (hereinafter referred to as an operating system) of the VR terminal may determine that the identity of the user wearing the VR terminal is legal, and execute the target task.
If the collected interactive behavior characteristics are not matched with the preset interactive behavior characteristics, the operating system does not respond to the execution instruction, and the number of times of authentication for the user is counted; when the number of times of authentication for the user wearing the VR terminal reaches a preset number of times, further security authentication can be performed for the user, and after the security authentication passes, the target task is performed after the user wearing the VR terminal is determined to be legal.
In this example, after determining that the identity of the user wearing the VR terminal is legal, the operating system usually opens the execution permission of the target task to the user completely; in this case, if a valid user of the VR terminal does not wear the VR terminal any more, and other users who do not pass authentication wear the VR terminal again, the VR terminal may be exposed to a certain risk of use.
In an embodiment shown, a feature recognition model capable of representing habit interactive behavior features of a legal user can be trained through a preset deep learning algorithm based on a plurality of interactive behavior feature samples of the legal user of the VR terminal collected in advance;
for example, when wearing a VR for an immersion experience, a legitimate user is accustomed to a head gesture, a three-dimensional gesture, a movement trajectory of an operation focus, and the like in a VR scene.
In this example, the operating system may be loaded with the trained feature recognition model in advance. After the user wearing the VR terminal passes the identity authentication, the operating system can still continue to acquire the interactive behavior characteristics of the user wearing the VR terminal through the sensing hardware, and input the acquired interactive behavior characteristics into the characteristic identification model for characteristic identification so as to determine whether the acquired interactive behavior characteristics are matched with the habitual interactive behavior characteristics of the legal user of the virtual reality terminal.
If the collected interactive behavior characteristics are determined to be not matched with the habit interactive behavior characteristics of the legal user of the VR terminal after the model is identified, the detected interactive behavior characteristics are likely to be the interactive behavior generated when the legal user leaves the VR terminal after unlocking the VR terminal and another illegal user wears the VR terminal. In this case, the operating system may restart the flow of performing further security authentication for the user wearing the VR terminal.
Through this kind of mode, can be based on legal user's habit interactive behavior characteristic, after the user identity who wears this VR terminal is legal in the affirmation, under the current condition of wearing person "do not know" at the background, continue to carry out safety protection to this VR terminal to can promote the safety in utilization level at VR terminal.
The technical solution in the present application is described in detail below by taking the above target task as an example of an unlocking task for a VR terminal.
Of course, it should be noted that the target task is an unlocking task for the VR terminal, which is only exemplary and not limiting. In practical applications, the target task may also be a verification task based on quick payment in a VR scenario; and the verification task of account login based on the VR scene, and the like.
The technical scheme of the application is described in detail through three stages of VR scene model creation, VR terminal unlocking and safety protection after VR terminal unlocking.
1) VR scene model creation
In this example, a developer may complete the creation of the VR scene model through a specific modeling tool. The modeling tool is not particularly limited in this example; for example, a developer may complete the creation of a VR scene model using more sophisticated modeling tools such as Unity, 3dsMax, Photoshop, and the like.
In the process of creating a VR scene model through a modeling tool, developers can both obtain the VR scene model and a texture map of the VR scene from a real scene in real life; for example, a texture map and a plane model of a real scene may be acquired by shooting in advance, then textures are processed and a three-dimensional model of the real scene is constructed by using a modeling tool such as Photoshop or 3dmax, then the three-dimensional model is imported to a unity3D platform (U3D for short), picture rendering is performed in the U3D platform through multiple dimensions such as sound effects, graphical interfaces, plug-ins, and lights, then interactive codes are written, and finally modeling of a VR scene model is completed.
In this example, besides the need to create a VR scene model, a developer may also create a 2D or 3D screen locking interface for the operating system of the VR terminal through the modeling tool.
The screen locking interface can be used as an initial interface for trying to perform an operating system of the VR terminal after the VR terminal is started by a user; or, a front page before outputting the VR scene model created by the developer.
When the user finishes the legality aiming at the identity of the user by executing the preset interactive behavior characteristics under the prompt of the screen locking interface, the operating system of the VR terminal can open the access right of entering the operating system at the moment, and then the VR scene model created by the developer is output, so that the wearer can obtain immersion experience in the output VR scene model.
The specific form of the lock screen interface is not particularly limited in this example; in practical application, personalized customization can be performed based on user experience.
2) Unlocking of VR terminal
In this example, after the wearer starts the VR terminal, the VR terminal may output the screen locking interface through the operating system.
In this example, a plurality of virtual elements (e.g., virtual buttons) for triggering unlocking may be provided in the lock screen interface in advance. The user can select the virtual element through some simple interactive operations, and then an unlocking process for the VR terminal is triggered.
For example, in one implementation shown, a virtual button for triggering unlocking may be provided in the lock screen interface, and the wearer may control the movement of the operation focus (also referred to as a visual focus) through a head gesture, a three-dimensional gesture, or an external device, position the operation focus on the virtual button, and then perform some simple interactive operations (e.g., a simple sliding of the operation focus on the virtual button) to trigger an unlocking procedure for the VR terminal.
Of course, in addition to the virtual button for triggering unlocking provided in the screen locking interface, in practical applications, an entity button for triggering unlocking may be provided on an external device of the VR terminal, for example, an operation lever or an operation handle external to the VR terminal, so that when the VR terminal needs to be unlocked, the entity button may be pressed to trigger an unlocking process for the VR terminal.
In this example, after the unlocking process for the VR is triggered, the VR terminal may report an unlocking instruction to the operating system, for example, the unlocking instruction may specifically be an unlocking signal, and after receiving the unlocking instruction, the operating system of the VR terminal may respond to the unlocking instruction and execute the authentication logic shown in steps 101 to 103 to start the unlocking process for the VR terminal.
In this example, after the operating system of the VR terminal starts the unlocking process:
on one hand, at this time, the wearer of the VR terminal can actively verify the validity of the identity of the wearer by executing the preset interactive behavior feature.
On the other hand, the operating system of the VR terminal can acquire the interactive behavior characteristics of the wearer through preset sensing hardware, and match the interactive behavior characteristics with the interactive behavior characteristics for unlocking preset in the operating system by a legal user of the VR terminal, so as to verify whether the identity of the current wearer of the VR terminal is legal.
In this example, the interactive behavior feature may include a head pose of the user, a three-dimensional gesture, or a displacement trajectory generated by the user controlling movement of a visual focus in the VR scene through the head pose, the three-dimensional gesture, or an external device.
That is, for a legitimate user of the VR terminal, in order to improve the usage security level of the VR terminal, the VR terminal may interact with an operating system of the VR terminal (for example, interact with a setting interface of the operating system), and preset a user-defined head posture, a user-defined three-dimensional gesture, or a user-defined special displacement trajectory of the operation focus.
In one embodiment shown, the above-mentioned interactive behavior characteristic is assumed to be a customized head gesture preset by the user (such as nodding, shaking, or other customized head gestures).
Under the condition, after a wearer of the VR terminal triggers an unlocking process, the operating system of the VR terminal can call gravity sensing hardware carried in the VR terminal, perform displacement tracking on the head of the user, and transmit collected head displacement data back to the operating system.
After receiving data returned by the gravity sensing hardware, the operating system can calculate the received head displacement data through an AR engine in the operating system, calculate parameters such as offset and rotation amount of the head of the user relative to an X/Y/Z axis of a VR scene, perform data modeling based on the parameters, and restore the head posture of the user; then matching the restored head gesture with a head gesture for unlocking, which is pre-configured by a legal user of the VR terminal; if the matching is successful, the user identity of the current wearer can be determined to be legal, at this time, the operating system can unlock the VR terminal, the access right of the operating system is opened, and the screen locking interface is closed.
In another embodiment, the interactive behavior feature is assumed to be a customized three-dimensional gesture preset by the user (such as a grip, a rotation in a specific direction, or other customized three-dimensional gestures)
Under the condition, after a wearer of the VR terminal triggers an unlocking process, the operating system of the VR terminal can call sensing hardware carried in the VR terminal, perform displacement tracking on the hand of the user, and transmit collected hand displacement data back to the operating system.
After receiving the data returned by the sensing hardware, the operating system can calculate the received hand displacement data through an AR engine in the operating system, calculate parameters such as offset and rotation amount of the hand of the user relative to an X/Y/Z axis of a VR scene, perform data modeling based on the parameters, and restore the three-dimensional gesture of the user; then matching the restored three-dimensional gesture with a three-dimensional gesture for unlocking, which is pre-configured by a legal user of the VR terminal; if the matching is successful, the user identity of the current wearer can be determined to be legal, at this time, the operating system can unlock the VR terminal, the access right of the operating system is opened, and the screen locking interface is closed.
It should be noted that the sensing hardware called by the operating system when recognizing the three-dimensional gesture of the user depends on the implementation scheme adopted when recognizing the three-dimensional gesture.
For example, in a conventional implementation of VR technology, when recognizing a three-dimensional gesture of a user, it may be generally implemented by a scheme such as a TOF (Time of Flight) scheme, a two-camera binocular imaging scheme, a structured light scheme, and a micro radar scheme. When the three-dimensional gesture of the user is recognized based on a dual-camera binocular imaging scheme, the sensing hardware can be an image sensor; when identifying a three-dimensional gesture of a user based on a TOF scheme, the sensing hardware may then be an infrared sensor. When recognizing a three-dimensional gesture of a user based on a structured light scheme, the sensing hardware may be a laser sensor. When recognizing a three-dimensional gesture of a user based on a knot-mini radar scheme, the sensing hardware may be a radar sensor, or the like.
In another embodiment shown, the above-mentioned interactive behavior characteristic is assumed to be a moving track of an operation focus preset by a user.
In this case, the wearer can control the operation focus to move on the lock screen interface by head posture, three-dimensional gesture, or by operating an external device such as a joystick or an operation handle, so as to generate a movement track.
After a wearer of the VR terminal triggers an unlocking process, an operating system of the VR terminal can call gravity sensing hardware (such as gravity sensing hardware carried in a VR helmet, a user hand or external equipment) carried in the VR terminal, perform displacement tracking on the head, the gesture and the external equipment of the user, synchronously control the displacement of an operation focus in a VR scene based on the head, the gesture and the displacement of the external equipment of the user, and then calculate a moving track from the operation focus to the VR scene.
In order to enable the user to visually check the generated movement track, the operating system may highlight (for example, highlight) the calculated operation track in the screen locking interface.
After the operating system calculates the moving track of the operating focus in the VR scene, the moving track can be matched with a moving track for unlocking, which is pre-configured by a legal user of the VR terminal; if the matching is successful, the user identity of the current wearer can be determined to be legal, at this time, the operating system can unlock the VR terminal, the access right of the operating system is opened, and the screen locking interface is closed.
It should be noted that, in this example, when the user matches the acquired interactive behavior feature with the user behavior feature preset by the legitimate user, in order to avoid the problem that the legitimate user cannot unlock the VR terminal due to the user presetting a particularly complex user behavior feature, in the matching process, it may not be necessary to adopt accurate matching (i.e., the interactive behavior feature is completely matched), but fuzzy matching is adopted, that is, as long as the similarity between the acquired user behavior feature and the user behavior feature preset by the legitimate user reaches a preset threshold, it may be considered that the two are matched.
In this example, when the operating system finally determines that the interactive behavior feature executed by the wearer does not match the interactive behavior feature preset by the legitimate user for unlocking through the unlocking verification process shown above, the operating system may not respond at this time, and may start a counter in the background at the same time to count the number of times of unlocking the wearer (i.e., the number of times of authentication for the user).
When the unlocking times of the wearer reach the preset times, the unlocking is still not successful, and at this time, the operating system may start a security authentication procedure for the wearer, and perform further security authentication for the wearer.
In this example, when further security authentication is performed for the wearer, this may be done in particular in the manner shown below.
In one embodiment shown, the biometric feature (such as a fingerprint) of the wearer may be collected by biometric identification hardware carried by the VR terminal to further secure the user.
Under the condition, when the retry number of unlocking of the wearer reaches a preset threshold value, the operating system can output a prompt message for prompting the user to acquire biological characteristics for safety authentication on a screen locking interface; for example, when the biometric feature is a fingerprint, the prompt message may be a text message "please input fingerprint information to complete unlocking authentication".
At this time, the operating system can acquire the biological characteristics of the wearer through the biological identification hardware, and match the acquired biological characteristics with the biological characteristics reserved by the legal user of the VR terminal; if the collected biological characteristics are matched with the biological characteristics reserved by the legal user of the VR terminal, the safety certification of the current wearer of the VR terminal can be determined to pass, and the VR terminal is unlocked.
In one embodiment shown, further security authentication may also be performed by a user-entered authentication password.
The identity authentication password may be a security authentication password preset by a legal user, or a password dynamically issued by an operating system to the legal user.
Under the condition, when the retry number of unlocking of the wearer reaches a preset threshold value, the operating system can display an input box on the screen locking interface and output a prompt prompting the user to input an identity verification password to complete security authentication; for example, the prompt message may be a text message "please input an authentication password to complete unlocking authentication".
When the wearer inputs an authentication password in the screen locking interface, the operating system matches the authentication password with an authentication password reserved by a legal user or an authentication password issued by the operating system; if the two are matched, the safety certification of the current wearer of the VR terminal can be determined to pass, and the VR terminal is unlocked.
3) Safety protection after VR terminal unblock
In this example, after the VR terminal is successfully unlocked, since the VR terminal is successfully unlocked, the access right of the operating system will be completely opened, in this case, when a valid user of the VR terminal does not wear the VR terminal any more, if the VR terminal still maintains an unlocked state, the VR terminal may still face a certain risk of use.
In an embodiment shown, a feature recognition model capable of representing habit interactive behavior features of a legal user can be trained through a preset deep learning algorithm based on a plurality of interactive behavior feature samples of the legal user of the VR terminal collected in advance; for example, when wearing a VR for an immersion experience, a legitimate user is accustomed to a head gesture, a three-dimensional gesture, a movement trajectory of an operation focus, and the like in a VR scene.
The deep learning algorithm is not particularly limited in this example, and a mature deep learning algorithm such as a neural network and a regression algorithm may be used in practical applications. When the feature recognition model is trained, the training can be completed on the VR terminal (for example, the VR terminal can independently carry a deep learning algorithm), or can be completed on a host machine collocated with the VR terminal, or can be completed on a server in the cloud, which is not particularly limited in this example.
The operating system of the VR terminal may be loaded with the trained feature recognition model in advance. After the VR terminal is successfully unlocked, the operating system can still continuously acquire the interactive behavior characteristics of the user wearing the VR terminal through sensing hardware, and performs characteristic identification on the acquired interactive behavior characteristic input value in the characteristic identification model so as to determine whether the acquired interactive behavior characteristics are matched with the habit interactive behavior characteristics of the legal user of the virtual reality terminal.
If the collected interactive behavior characteristics are determined to be not matched with the habit interactive behavior characteristics of the legal user of the VR terminal after the model is identified, the detected interactive behavior characteristics are likely to be the interactive behavior generated when the legal user leaves the VR terminal after unlocking the VR terminal and another illegal user wears the VR terminal.
In this case, the operating system may re-lock the VR terminal, and restart the process of performing further security authentication for the user wearing the VR terminal, and the specific security authentication process is not described again.
Therefore, by the mode, based on habit interaction behavior characteristics of a legal user, after the VR terminal is successfully unlocked, safety protection is continuously performed on the VR terminal under the condition that a current wearer is 'unaware' at the background, so that the use safety level of the VR terminal can be improved.
Of course, in practical applications, besides the above-described deep learning model that can represent the habit interactive behavior characteristics of the legitimate user by training, the safety protection after successful unlocking can be performed on the VR terminal, and the safety protection after successful unlocking can also be continuously performed on the VR terminal by other means.
For example, in practical applications, a conventional unlocking timeout mechanism may be introduced, that is, after the VR terminal is successfully unlocked, if the operating system of the VR terminal does not detect any form of interactive operation within a preset time period, the locking state may be automatically performed, which is not listed in this example.
The technical solution in the present application is described in detail by taking the above target task as an example of an unlocking task for a VR terminal.
It should be noted that, in this example, the authentication logic shown in steps 101 to 103 may also be applied to other application scenarios besides the application scenario of unlocking the VR terminal.
For example, when the method is applied to a quick payment scene in a VR scene, the target task may be a verification task based on quick payment in the VR scene; in this case, the operating system may verify the payment identity of the user when the user performs quick payment in the VR scenario by executing the authentication logic shown in steps 101 to 103, and complete payment after the authentication is passed.
After the identity of the user passes the verification, the operating system may further continue to recognize whether the interactive behavior feature of the user wearing the VR terminal is the habit interactive behavior feature of the legal user through the trained interactive behavior feature recognition model, and when it is recognized that the interactive behavior feature of the user currently wearing the VR terminal is not the habit interactive behavior feature of the legal user, perform further security authentication on the identity of the user currently wearing the VR terminal, re-authenticate the payment identity of the user, and the specific implementation process is not described in detail, and those skilled in the art may also perform equivalent implementation by referring to the implementation process in the unlocking scenario shown above.
For another example, when the method is applied to an account login scene in a VR scene, the target task may be a verification task based on account login in the VR scene; in this case, the operating system may perform the authentication logic shown in steps 101 to 103, when the user logs in an account in a VR scenario, authenticate the login identity of the user, and interact with the corresponding login server after the authentication is passed to complete the login.
After the identity of the user passes the verification, the operating system may further continue to recognize whether the interactive behavior feature of the user wearing the VR terminal is the habit interactive behavior feature of the legal user through the trained interactive behavior feature recognition model, and when it is recognized that the interactive behavior feature of the user currently wearing the VR terminal is not the habit interactive behavior feature of the legal user, perform further security authentication on the identity of the user currently wearing the VR terminal, and re-verify the login identity of the user, and the specific implementation process is not described in detail, and those skilled in the art may also perform equivalent implementation by referring to the implementation process in the unlocking scenario shown above. Of course, besides the two application scenarios shown above, the authentication logic shown in steps 101 to 103 can also be applied to other similar application scenarios that require user authentication, which are not listed in this example.
As can be seen from the description of the above embodiment, in the application, when a user wearing a virtual reality terminal executes a target task that needs to perform identity authentication, the virtual reality terminal may collect interactive behavior characteristics of the user wearing the virtual reality terminal through preset sensing hardware, and match the collected interactive behavior characteristics with interactive behavior characteristics preset by a valid user of the virtual reality terminal; if the collected interactive behavior characteristics are matched with the preset interactive behavior characteristics, the identity of the user wearing the virtual reality terminal is determined to be legal, and the target task is executed, so that the purpose that the user can actively verify the identity validity of the user through executing the preset interactive behavior if the target task needing identity verification is required to be executed in the process of wearing the virtual reality terminal to perform immersion experience is achieved, and the privacy and the safety of the user when the user uses the virtual reality terminal can be further guaranteed.
Corresponding to the method embodiment, the application also provides an embodiment of the device.
Referring to fig. 2, the present application provides a device 20 for user authentication, which is applied to a VR terminal; referring to fig. 3, a hardware architecture related to a VR terminal as the device 20 for carrying the user authentication generally includes a CPU, a memory, a non-volatile memory, a network interface, an internal bus, and the like; in software implementation, the apparatus 20 for user authentication can be generally understood as a computer program loaded in a memory, and a logic apparatus formed by combining software and hardware after being executed by a CPU, where the apparatus 20 includes:
the acquisition module 201 is used for responding to an execution instruction aiming at a target task needing to be subjected to identity authentication and acquiring the interactive behavior characteristics of a user wearing the virtual reality terminal through preset sensing hardware;
the matching module 202 is used for matching the acquired interactive behavior characteristics with interactive behavior characteristics preset by a legal user of the virtual reality terminal;
and the verification module 203 determines that the identity of the user wearing the virtual reality terminal is legal and executes the target task if the acquired interactive behavior characteristics are matched with the preset interactive behavior characteristics.
In this example, the interactive behavior feature includes any one of a head pose of the user, a three-dimensional gesture, and a displacement trajectory generated by controlling the movement of the visual focus by the head pose, the three-dimensional gesture, or an external device.
In this example, the apparatus 20 may further include:
an authentication module 204 (not shown in fig. 2) configured to, if the collected interactive behavior feature does not match the preset interactive behavior feature, perform further security authentication on the user wearing the virtual reality terminal when the number of authentication times for the user reaches a preset number of times;
the verification module 203 further:
and after the safety certification is passed, determining that the user identity wearing the virtual reality terminal is legal, and executing the target task.
In this example, the apparatus 20 may further include:
the identification module 205 (not shown in figure 2),
after the identity of the user wearing the virtual reality terminal is determined to be legal, acquiring interactive behavior characteristics of the user wearing the virtual reality terminal through preset sensing hardware; inputting the collected interactive behavior characteristics into a preset interactive behavior characteristic recognition model for characteristic recognition so as to determine whether the collected interactive behavior characteristics are matched with the habit interactive behavior characteristics of the legal user of the virtual reality terminal; the preset interactive behavior feature recognition model is obtained by training a plurality of interactive behavior feature samples of a legal user of the virtual reality terminal based on a preset deep learning algorithm; the preset interactive behavior feature recognition model represents the habit interactive behavior features of the legal user of the virtual reality terminal;
the authentication module 204 further:
and if the acquired interactive behavior characteristics are not matched with the habit interactive behavior characteristics of the legal user of the virtual reality terminal, performing further safety certification aiming at the user wearing the virtual reality terminal.
In this example, the authentication module 204 specifically:
acquiring the biological characteristics of the user through preset biological identification hardware, matching the acquired biological characteristics with the biological characteristics preset by the legal user of the virtual reality terminal, and determining that the safety certification for the user passes if the acquired biological characteristics are matched with the biological characteristics preset by the legal user of the virtual reality terminal; or,
and acquiring an authentication password input by the user, matching the acquired authentication password with a preset authentication password, and determining that the security authentication for the user passes if the acquired authentication password is matched with the preset authentication password of the legal user of the virtual reality terminal.
In this example, the target task may include an unlocking task for the virtual reality terminal.
Other embodiments of the present application will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This application is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the application and including such departures from the present disclosure as come within known or customary practice within the art to which the invention pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the application being indicated by the following claims.
It will be understood that the present application is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the application is limited only by the appended claims.
The above description is only exemplary of the present application and should not be taken as limiting the present application, as any modification, equivalent replacement, or improvement made within the spirit and principle of the present application should be included in the scope of protection of the present application.